Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen of death” reboot, and displays a red skull and crossbones. As the computer restarts, a fraudulent “system check” allows the infection to encrypt the master file table (MFT), so the computer more or less “forgets” where, or even which, files it has.

In addition to doing this, instead of barring access from particular files, Petya locks the user out of their system entirely by overwriting their computer’s master boot record. Once this happens, the computer is rendered useless (you can’t even log in), only displaying a list of demands, an online address to appease those demands in Bitcoin, and finally, a decryption code to regain access to the files.

When the user accesses the payment page, they learn that they have a limited amount of time to purchase their key before the price is doubled--from around an initial cost of .99 Bitcoins, which is equivalent to about $430. While many websites claim that there are commands that will allow the user to skip the lock screen, the MFT will still be encrypted, and the files still useless. Additionally, there’s no guarantee that the decryption key provided upon payment will even solve the problem, potentially leaving the user short $430 and all of their digital files.

Business owners and human resource representatives need to be particularly alert, considering that the preferred method of dispersement for Petya is via email, specifically disguised as what would appear to be a message from someone seeking a job. The message contains a hyperlink that directs to a Dropbox containing a “resume” (an antivirus program-blinding Trojan containing Petya) and a stock photo. With these tactics, Petya had been plaguing German businesses, with no telling when it may spread.

Fortunately, a programmer has come up with a fix to remove Petya without paying any ransom after his father-in-law’s system was targeted. Thanks to some purported carelessness by the authors of this malware, the encryption is crackable. To do so, however, isn’t such a simple task - it requires a second, uninfected hard drive, for starters. So while Petya has been cracked, it is still better to not be a target in the first place.

So how does one avoid such an attack? Mainly vigilance, assisted by Total Tech Care’s security solutions that help detect and block questionable sources. Call 866-348-2602 for more information about products to keep your company safe from the cyber pirates flying a digital skull and bones.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Saving Money Holiday Social Media Tech Term Gadgets Chrome Virtualization Managed Service Managed IT Services Automation Microsoft Office Facebook Operating System Artificial Intelligence Cybercrime Computers BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Health Office 365 Information Telephone Systems Remote Managed Service Provider Information Technology Alert Covid-19 Spam Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Applications Application App History Law Enforcement Big Data Human Resources Data Breach Password Money Mobile Computing Encryption Remote Monitoring Blockchain Paperless Office How To Government Office Tips Training Private Cloud Data Storage VPN Patch Management Managed IT Apps Remote Computing Mobile Office Data Security Google Drive Avoiding Downtime Wireless Infrastructure Voice over Internet Protocol Gmail Vulnerability Settings Windows 7 Word Bring Your Own Device Data Management Work/Life Balance Two-factor Authentication Flexibility Servers Marketing WiFi Mouse HaaS IT solutions Entertainment Website Budget Meetings Safety USB HIPAA Sports Redundancy Telephone System Staff Software as a Service Machine Learning Keyboard Risk Management Remote Work Hacker Connectivity The Internet of Things Lithium-ion battery Conferencing Save Time Vendor Scam Managed Services Firewall Display Data Protection Cleaning Virtual Reality Apple Vendor Management Employee/Employer Relationship RMM Social End of Support Education User Error Physical Security Virtual Assistant Current Events Wearable Technology Telephony Authentication Hard Drives Samsung PDF Retail Digital Signage Instant Messaging IT Consultant Robot Excel Value Proactive IT Biometrics Humor Update Electronic Medical Records Procurement Virtual Desktop Best Practice Spam Blocking Workplace Strategy Net Neutrality YouTube Black Market Google Docs Hiring/Firing Identity Theft DDoS Help Desk Printing SharePoint Document Management Wireless Technology Solid State Drive How to Managed Services Provider Downtime Augmented Reality Fraud Customer Service Environment Business Intelligence Database Data storage Remote Worker Worker Virus Automobile Remote Workers Fax Server Audit IT Management Cryptocurrency Processor Unified Threat Management Computer Accessories SaaS Computing Infrastructure Botnet Going Green IT Plan Hard Drive Comparison Unsupported Software CES Network Congestion Battery eWaste Charger Printer Computing Shadow IT Business Technology Bluetooth Content Management Legal Access Control Compliance OneNote Computer Care Internet Exlporer Cabling Cost Management Messaging Two Factor Authentication Workforce Policy Hypervisor Social Networking Virtual Private Network Notifications Netflix Root Cause Analysis Cables Dark mode Trend Micro Default App HBO Knowledge Music SMS Telecommuting Procedure Running Cable Saving Time Relocation Skype Project Management Nanotechnology Memory Data loss Cortana dark theme Shopping Google Search IT Infrastructure Outlook Leadership Digital Signature Troubleshooting AI Video Games FinTech Worker Commute Start Menu Warranty Bing Screen Mirroring HVAC Loyalty Google Apps Experience Social Network Scalability Investment Frequently Asked Questions Analysis Books Employees Business Owner Employee/Employer Relationships Mobile Administrator Science Windows 10s Devices Consultant NarrowBand Cast Enterprise Content Management Analytics Windows 365 ISP Search ROI Tip of the week MSP webinar Accountants Emergency Video Conferencing Employer Employee Relationship Credit Cards Sales Distributed Denial of Service Bitcoin iPhone Customer Relationship Management Professional Services Microchip Shortcuts Public Cloud Thought Leadership Best Available Analyitcs Password Management WIndows 7 Assessment Password Manager Point of Sale Personal Cryptomining Programming Windows Server 2008 Multi-Factor Security Supply Chain Management Monitoring Batteries Files Tools Search Engine Twitter Chromecast NIST Television Business Mangement Windows 8.1 Digitize Antivirus Windows Server 2008 R2 Smart Tech Trending Amazon Customer relationships Colocation Uninterrupted Power Supply Windows 8 Addiction User Public Computer Recycling PowerPoint Email Best Practices Windows Media Player IT Assessment IT service Manufacturing Monitor Regulations Wiring Practices Transportation Rootkit Amazon Web Services Computer Tips Managed IT Service Security Cameras Tablet Computer Fan Cache Biometric Security Safe Mode Managing Stress Criminal Virtual CIO OneDrive Domains Peripheral Reputation GDPR Streaming Media Workers Hosted Computing Benefits Online Shopping Cameras Digital Security Cameras Content IaaS Using Data Maintenance Tech Support FENG Wireless Internet 5G Laptop Bloatware File Sharing IBM Copiers Techology Quick Tip Customers Flash Camera Inventory Smart Technology Specifications Evernote Ergonomics Audiobook Smartwatch Tablets Wire OLED Touchpad Entrepreneur Software Tips Supercomputer Travel Development PCI DSS Virtual Machine Sync Printers Emails Millennials Smart Office Wireless Charging Printer Server 2FA Politics Fiber Optics Advertising Shortcut Employee

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code